On Thu, Nov 23, 2006 at 01:03:00PM +0100, carlopmart wrote: > We have several problems with ipsec connections for roadwarriors > clients using x509 certificates. We use ipsec.conf to accomplish this > configuration: > > ike passive proto tcp from 192.168.2.3 to { 129.31.0.0/16, > 129.11.0.0/16, 129.61.0.0/16, 129.71.0.0/16 } port 5900 \ > quick auth hmac-sha1 enc 3des group modp1024 > ike passive proto tcp from 192.168.2.3 to { 129.31.0.0/16, > 129.11.0.0/16, 129.61.0.0/16, 129.71.0.0/16 } port 3389 \ > quick auth hmac-sha1 enc 3des group modp1024 > ike passive esp from 192.168.0.3 to any main auth hmac-sha1 enc 3des \ > srcid firewall.ourdomain.com dstid [EMAIL PROTECTED] > > ike passive proto tcp from { 192.168.2.9, 192.168.2.10, 192.168.2.11 } > to { 129.42.0.0/16, 192.168.156.0/24 } port 5900 \ > quick auth hmac-sha1 enc 3des group modp1024 > ike passive proto tcp from { 192.168.2.9, 192.168.2.10, 192.168.2.11 } > to { 129.42.0.0/16, 192.168.156.0/24 } port 3389 \ > quick auth hmac-sha1 enc 3des group modp1024 > ike passive esp from 192.168.0.3 to any main auth hmac-sha1 enc 3des \ > srcid firewall.ourdomain.com dstid [EMAIL PROTECTED] > > Well, this configuration doesn't works. If user [EMAIL PROTECTED] > connects to our lans, [EMAIL PROTECTED] (if he is connected) lost > all connections. > > If we change third and sixth lines with: > > ike passive esp from 192.168.0.3 to any main auth hmac-sha1 enc 3des > srcid firewall.ourdomain.com > > only one user can be authenticated. Somebody how can I resolve this > problem?? ipsec.conf man pages doesn't helps .....
We have the following in /etc/ipsec.conf: ike passive esp from 192.168.1.0/24 to any \ main auth hmac-sha1 enc aes group modp1024 \ quick auth hmac-sha1 enc aes \ srcid vpn.fqdn.com With this, I can have multiple users behind a single NAT firewall connect without anyone being dropped. This is with isakmpd on OpenBSD 4.0. We're using X.509 certificates as well. -- albert chin ([EMAIL PROTECTED])